(using the keys established between the devices and the ICE Super-
visor) published by the connected devices, and the ICE Supervisor
decrypted the timestamps to evaluate the validity of the received
heartbeat messages.
than the timestamp to mitigate the replay attack discussed above
which can not be mitigated by DDS security.
All the attacks and defenses discussed above are not only appli-
cable to OpenICE. Actually, these attacks and defenses are based
on the publish-subscribe paradigm used by DDS, thus they are ap-
plicable to any ICE systems using this communication paradigm,
such as the Medical Device Coordination Framework (MDCF).
The results of this experiment are illustrated in Figure 13, which
indicates that calculating timestamps and appending them to heart-
beat messages caused the average CPU usage to increase by 19.98%,
and the peak CPU usage raised to 60% (from the original 39%). In
addition, Figure 13 also sees an increase in the average memory
usage by 45.9% due to calculating timestamps. These results confirm
that using timestamps to ensure time validity of communicated
messages can cause significant computational overhead and in turn
system performance degradation in OpenICE. In contrast, as blue
curves show, our defense mechanism to prevent replay attacks only
imposed a slight burden on system performance.
7
RELATED WORK
The security of interoperable medical systems in general, and ICE
systems in particular, has been attracting increasing attentions
from both industry and academia. Most previous research in this
direction focused on establishing reasonable high-level security
requirements for ICE systems, such as[4, 5]. Vasserman et al.[15]
defined a set of fundamental security requirements for safe and
secure next-generation medical systems consisting of dynamically
composable units, tied together through a real-time safety-critical
middleware. They suggested to eliminate these security require-
ments from the system level. Venkatasubramanian et al.[16, 17]
enumerated five typical categories of possible security attacks to
the ICE platform, based on how the ICE platform may be attacked
and the consequence caused by such attacks.
Few security mechanisms have been proposed and implemented
on realistic ICE systems. In fact, the only security mechanism for
ICE systems aware by the authors was proposed by Salazar and
Figure 13: CPU and Memory usage, where blue curves rep-
resent the usage with our defense presented in 4.3 against
replay attack and red curves represent that with timestamp
calculation.
Vasserman [11, 12], which implemented a modularized prototype
for device authentication and communication encryption within
the MDCF context. It provides preliminary access control to ICE
systems with a break-the-glass feature. The defense mechanisms
presented in this paper distinguishes itself from that by Salazar
and Veasserman in the following aspects: 1) our mechanisms tar-
get specifically at OpenICE, a realistic instantiation of the ICE
framework. The MDCF, on the other hand, intends to provide a
model-based design and simulation framework for ICE systems;
2) our defense mechanisms have been shown effective to prevent
security attacks that target at vulnerabilities at the network layer
in OpenICE, as compared to their mechanism focuses primarily on
system-level security design of ICE systems.
From the results of the attack-defense experiment, we can con-
clude that: Firstly, the identified attacks are practical, due to the
limitation of OpenICE without DDS security. Secondly, the pre-
sented defense mechanisms are effective in preventing these at-
tacks. Thirdly, the computational cost of the defense mechanisms
can cause certain degradation in system performance. However,
whether such degradation can cause clinical risks, such as delay or
disruption to clinical procedures should be evaluated in real clinical
practices or by consulting with healthcare providers.
Based on OpenICE, Soroush et al.[13] developed two prototypes
of security mechanisms for OpenICE based on TLS and DDS Secu-
rity, respectively. They pointed out that DDS Security could provide
more resilience against insider attacks utilizing authenticated but
compromised medical devices. However, these mechanisms cannot
address security challenges caused by the unique design character-
istics of OpenICE. Our work discovers that DDS Security cannot
provide fine-grained access control over the HeartBeat topic, so that
an adversary can leverage compromised devices inside the system
to get some key information, and in turn launch some attacks such
as the replay attack.
6
DISCUSSION
We have to emphasize that the security attacks and corresponding
defense mechanisms discussed in this paper are based on the pre-
condition that OpenICE does not integrate DDS Security. In fact, in
its latest release, DDS Security has provided certain security fea-
tures such as authentication, access control and cryptography. Thus,
DDS Security has the ability to mitigate interception and tampering
attacks, by providing access control over topics per device [13].
However, DDS Security cannot provide fine-grained access control
over the HeartBeat topic for connected devices. That is, in OpenICE
every device has the privileges to read from and write to the Heart-
Beat topic. If a genuine device is compromised, an adversary can
access to the HeartBeat topic and acquire its device identifier to ini-
tiate replay attacks. In comparison, our defenses are implemented
on top of DDS. They may not be as efficient as DDS security, but
they can also mitigate the interception and tampering attacks. In
addition, we present a simple solution which is much more effective
8
CONCLUSIONS
Emerging interoperable medical systems indicates a promising fu-
ture for healthcare, and ICE is a prominent effort towards this vision.
However, security threats can jeopardize the safety of interoperable
medical systems and expose patients and users to unwanted risks. In
this paper, we have analyzed the security threats that can leverage
SIGBED Review
22
Vol. 16, Num. 2, July 2019